Tuesday, Mar 25, 2014

PODCAST: Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Doug Van Houweling about how the NSFNet went from connecting a few supercomputers to becoming "the Internet."

Monday, May 12, 2014

PODCAST: Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Nathaniel Borenstein about how mail evolved from plaintext to multimedia.

Monday, Jun 9, 2014

PODCAST: Author Jane Cleland-Huang provides an audio recording of her Requirements column, in which she discusses the importance of making informed decisions about how much time and effort to invest in analyzing security needs and specifying product-level security requirements.

Wednesday, Jul 23, 2014

ARTICLE: Operating a datacenter at web scale requires managing many conflicting requirements. The ability to deliver computation at a high level and speed is a given, but because of the demands such a facility must meet, a datacenter also needs flexibility. Additionally, it must be efficient in its use of power, keeping costs as low as possible.

Tuesday, Jul 15, 2014

ARTICLE: Once a nascent technology understood only by networking visionaries, software-defined networking (SDN) has moved beyond the hype and into real-world network deployments. In 2012 and most of 2013, networking suppliers were primarily focused on communicating their SDN strategies and showcasing initial solutions. Over the last six to 12 months, however, TBR has witnessed not only a maturation of these solutions, but also the implementation of customer deployments as proof that SDN may transform the networking industry similar to how virtualization transformed the server industry over the last decade. Unlike in 2013, when SDN deployments were found only in the data centers of large cloud providers such as Google and Amazon, customers in other verticals such as retail and manufacturing are now using the technology in their production networks.

Thursday, Jul 24, 2014

ARTICLE: Transformation within the networking industry is occurring rapidly, as networks continue to evolve to fulfill their role as the delivery mechanism for a rapidly growing number of enterprise applications, particularly those being delivered via the cloud and mobile devices. As expected, most of the major network hardware suppliers, including Avaya, Cisco, Dell, HP and Huawei, had a strong presence at Interop Las Vegas 2014, and software vendors such as F5, VMware and Citrix have emerged as major players within the networking ecosystem. One notable exception was Juniper, whose presence was limited to leading a handful of workshops, as the company did not have a booth in the vendor exhibition hall — further evidence Juniper is de-emphasizing its enterprise business as it focuses on cutting costs in the short term and charting a course for long-term growth.

Friday, Jul 25, 2014

ARTICLE: Every day cybercriminals launch sophisticated malware attacks against organizations designed to steal valuable data or disable critical services to inflict damage on the organization. The number of malware attacks is increasing, but recent research from Technology Business Research Inc. (TBR) indicates the rate of increase varies significantly depending on the organization; malware attack rates are increasing more rapidly for some organizations and leveling off for others. Security vendors and service providers must adjust their strategies to adapt to changing attack rates.

Wednesday, Jul 30, 2014

ARTICLE: Just a few years ago, security breaches were typically enabled by vulnerabilities in the breached organization’s IT infrastructure. Today, however, many security breaches are the consequence of vulnerabilities in the IT infrastructures of the affected organization’s business partners, including the wholesalers, retailers, payment processors and other partners in the organization’s cyber supply chain. This has led to heightened expectations for strong security controls at cyber supply chain partner organizations, a primary topic of discussion at the SecureWorld Boston 2014 conference. Increased focus on cyber supply chain security has altered the way organizations evaluate security solutions and justify security expenditures. It has impacted the way security vendors and service providers engage with customers, placed more demands on cloud service providers and created opportunities for auditors and cyber insurance companies.

Tuesday, Aug 26, 2014

PODCAST: Author Charles Severance provides an audio recording of his Computing Conversations column, in which he discusses his interview with Nii Quaynor about how the story of bringing the Internet to Africa is one of cooperation and collaboration for the common good.

Wednesday, Aug 27, 2014

PODCAST: Futurist Brian David Johnson expands on his Science Fiction Prototyping column, speaking with Julie Hubschman about how she spent the summer with Jimmy the Robot, a walking, talking, tweeting science fiction prototype.

Tuesday, Sep 9, 2014

ARTICLE: Business success means to deliver the right solutions at the right time to the right markets. Requirements Engineering is the discipline within systems and software engineering that bridges the entire life cycle and thus determines success or failure of a product or project. This blog provides a fresh look on requirements engineering, and why you need to improve it...

Wednesday, Sep 10, 2014

ARTICLE: Data center transformation is no longer an option for only the brave or well-funded. Software-defined storage (SDS) is transforming data management into a simpler, less costly and more approachable option for customers compared to traditional models. Because the SDS approach is progressing more rapidly and at a more customer-accessible level than other technologies, such as networking, it will help define the overall software-defined data center movement that is in motion.

Friday, Sep 12, 2014

ARTICLE: The conference topics revolved around how to take advantage of cross-organizational collaboration and disruptive technologies such as predictive analytics to improve government services delivery through more efficient and innovative IT technology enablement.

Monday, Sep 22, 2014

ARTICLE: CEO and co-founder Christian Chabot kicked things off in front of a crowd of over 5,500 customers and partners. The theme of the opening keynote was “The Art of Analytics.” Mr. Chabot likened an analyst’s design process for data visualization to the creative process of an artist with a blank canvas or a sculptor with a slab or marble. Visualization software, he drove home, should “unleash the creative power of data” and has the power to “remove the drudgery” of analysis. - See more at: http://techproessentials.com/tableau-conference-2014-sir-mix-a-lot-was-only-the-beginning/#sthash.xdqJQqIr.dpuf

Wednesday, Sep 24, 2014

ARTICLE: The announcement of the creation of Simply Secure – “a new organization focused on making open source security tools simpler and easier for people to use” – is an interesting attempt to change the forces that have up to now been slowing or blocking the adoption of security in consumer-facing devices and applications.

Thursday, Oct 16, 2014

ARTICLE: With LTE now deployed pervasively across North America and gaining momentum in Latin America, industry focus is shifting toward how to densify these networks to handle the exponential increase in data traffic and how to monetize this powerful new network infrastructure. The private 2014 4G Americas Analyst Forum focused on these topics and others, and provided a unique view into how operators and vendors plan to address the major challenges the industry faces. Several of the sessions covered included how to better leverage Wi-Fi and cellular together, what 5G will look like, and what obstacles are slowing the take-off of the M2M market.

Tuesday, Oct 21, 2014

ARTICLE: Analytics are now an integral part of any supply chain information management system. Modern computing power and advances in analytical software have made powerful analytics not only possible, but practical for most businesses sitting on top of a cornucopia of supply chain data. Analytics run the gambit from historical data dumps to models that suggest the best course of action based on a set of probable outcomes.

Monday, Oct 27, 2014

BLOG POST: Collaboration of information and timing and are two extremely critical aspects of supply chain business intelligence and information management. Not getting data to the appropriate decision makers renders the information nominally useless. Not giving it to the right people, or right group of people, via the right mechanism also means that data loses value.

Wednesday, Oct 29, 2014

Thursday, Oct 30, 2014

ARTICLE: Symantec’s decision to split into two (as yet unnamed) companies was a much needed move to get Symantec back on track to competitive growth rates in the fast-moving security and storage software markets. Once renowned as an endpoint security vendor, the new Symantec security company is preparing to re-emerge as a stronger security vendor with a broader portfolio and a renewed focus on addressing the key drivers (such as zero-day threats) for businesses’ and consumers’ IT security decisions.

Thursday, Nov 6, 2014

ARTICLE: In 2009 Northrop Grumman sold TASC to private equity backers General Atlantic LLC and Kohlberg Kravis Roberts & Co. for $1.65 billion. The agreed-on price for TASC to Engility, nearly $550 million less than what TASC’s owners paid five years ago, likely reflects how challenging the federal IT environment has been since 2009. Additionally, TASC employs about 4,000 employees versus 5,000 at the time of the spin-off from Northrop. TASC’s projected revenue contribution to Engility in 2014 of $1.1 billion is down 31% from $1.6 billion in 2009 and implies a nearly flat 1x multiplier for the acquisition price.

Tuesday, Nov 11, 2014

Thursday, Nov 20, 2014

ARTICLE: David Alan Grier provides an audio recording of his Errant Hashtag column, in which he discusses how amateur software developers might lack precise technical skills but bring detailed knowledge of their environments to the table.

Tuesday, Nov 25, 2014

ARTICLE: t the hackathon kickoff (which took place in Phoenix, Arizona, during the 2014 Grace Hopper Celebration of Women in Computing), participants around the world worked on these challenges, connecting virtually with one another. Those of us in Arizona were excited to link up with female hackers in India, Japan, Nepal, England, South Africa, Turkey, Pakistan, Bangladesh, Brazil, Kenya, and Trinidad & Tobago. (

Friday, Nov 28, 2014

ARTICLE: The Internet of Things (IoT) is a mediocre phrase. It’s not creative or clever, and it doesn’t exactly roll off the tongue. It is only because the phenomenon’s potential is so great that it can get away with such a lackluster name. Every day, more machines, sensors, and devices are talking to data systems, and eventually, to analytics users. This data is complex, vast, and fast-moving. The IoT represents a new approach to thinking about devices and data generation, and so a new analytical approach is required as well.

Tuesday, Dec 16, 2014

PODCAST: Author Jane Cleland-Huang provides an audio recording of the Requirements column in which she discusses the Ready-Set-Transfer panel at the 2014 IEEE International Requirements Engineering Conference.

Thursday, Dec 18, 2014

ARTICLE: The researchers want to unravel the impact of micro-climate variation in the cloud forest ecosystem. Essentially, they want to understand how the forest works—how carbon dioxide, water, nitrogen, and other nutrients cycle through plants, animals, and microorganisms in this complex ecosystem. To do so, they’ve placed some 700 sensors in 15 forest plots, locating the devices at levels throughout the forest, from beneath the soil to the top of the canopy.

Friday, Dec 19, 2014

VIDEO: Author Grady Booch provides an audio recording of his On Computing column, in which he discusses how parallels exist between the Industrial Revolution and our current computing revolution regarding risk, transparency, and responsibility. Grady then examines some of these parallels, their implications for society, and individual developer’s responsibilities.

Friday, Dec 26, 2014

ARTICLE: There are a lot of things about modern Internet security that come up short when it comes to providing real protection but easily the biggest offender is passwords. We use passwords for everything, from logging into our mail and social networks to our banks and medical records. And the not so big secret is that, for the vast majority of people, passwords provide no security at all.

Monday, Dec 29, 2014

VIDEO: Researchers from the University of Texas partnered with other researchers, federal agencies, and first responders to create the National Flood Interoperability Experiment (NFIE). They used Microsoft Azure to build a new national flood data-modeling and mapping system with the potential to provide life- and cost-saving information to the public. The goals of the NFIE include standardizing data, demonstrating a scalable solution, and helping to close the gap between national flood forecasting and local emergency response.

Tuesday, Dec 30, 2014

VIDEO: Xim is a free app that gives you the ability to create a temporary, ad hoc network between multiple phones so you can share photos with others—whether remote or in the same room, without relinquishing your personal mobile device. Friends can follow along synchronously on their own devices or browser interface, and can even control the pace of photos or pinch and zoom while you provide color commentary. With version 1.3 you can share your photos on the big screen via streaming media devices.

Thursday, Jan 15, 2015

ARTICLE: Contemporary information technology isn't adequate to secure the valuable information these systems are entrusted to manage, as recent security breaches at US corporations and government agencies demonstrate. There are two reasons for this. First, public and private networks, based on Ethernet and the TCP/IP protocol, weren?t designed to protect information, but to make it easy to share information. Second, the architecture of the modern IT infrastructure was established long before cybercrime became the global nemesis that it is today, and therefore the issues of security and trust weren?t well understood or taken into account.

Tuesday, Jan 20, 2015

ARTICLE: In 2014, the cloud market rang in at $156 billion. In 2015, projected cloud spend is set at over 180 billion. With cloud spending eventually topping off at $235 billion in 2017, it seems evident that the growing trend in business is overall cloud adoption.

Monday, Jan 26, 2015

ARTICLE: Open source advocate William Hurley, known as whurley, got his start working for large companies--in research and development at Apple and as a master inventor for IBM. But where he found his real success was in co-founding new companies--first security management company Symbiot, then Chaotic Moon, an Austin-based mobile software design and development studio, and now Honest Dollar, a stealth financial technology startup that will launch this year at SxSW in Austin.

Wednesday, Jan 28, 2015

PODCAST: IP expert Brian M. Gaff discusses the myriad issues that most startups face before even opening their doors, including getting financing, hiring the right people, finding office space, and--importantly--getting the companyís intellectual property under control and adequately protected.

Friday, Feb 6, 2015

VIDEO: Guest editor Alf Weaver interviews Jingquan Li about his article "Ensuring Privacy in a Personal Health Record System" and balancing personalization, privacy, and security, from Computer's February 2015 issue on Computing in Healthcare.

Saturday, Feb 7, 2015

Monday, Feb 9, 2015

VIDEO: Author Brian M. Gaff provides an audio recording of his Computing and the Law column, in which he discusses how bring your own device (BYOD) allows employees to bring personally owned technology to their workplaces and use it in connection with their jobs.

Tuesday, Feb 10, 2015

VIDEO: Author David Alan Grier expands on his Errant Hashtag column, in which he discusses how location plays an important role in software development and how nine cities hold 40 percent of the U.S. software market, with particular specialties clustered in specific areas. From Computer's February 2015 issue.

Thursday, Feb 12, 2015

ARTICLE: Across the country, cubicle walls are coming down as businesses seek to take advantage of the cost-saving benefits associated with open-plan offices. While employees have been very vocal in their collective disdain for the latest workplace trend, it doesn’t appear to be going anywhere soon. In fact, more than 75 percent of U.S. offices now feature an open plan, according to research by Milwaukee design firm Kahler Slater, which means many Americans have no choice but to learn to work in this new environment.

Friday, Feb 13, 2015

ARTICLE: Cloud stands at a tipping point between the broad horizontal public platforms that drove the market and the fragmented private and hybrid capabilities that will form its future. The market is shifting to provide services that are customizable for the individual end customer, whether adding security, performance, features or management.

Monday, Feb 16, 2015

ARTICLE: Incumbent telecom operators in the U.S. face a new category of competitors that play by a different set of rules. These alternative network providers aim to disrupt the traditional telecom business model by lowering access costs and improving the user experience. Their motivations differ from incumbent telcos, which focus on monetizing their connectivity solutions. Rather, these alternative network providers view access as a sunk cost necessary to drive their other initiatives, such as digital advertising and e-commerce. The stakes are high because these market dynamics will shift the balance of power, money, and landscape makeup in coming years. Only the strongest and most nimble incumbent operators will survive the coming shakeout.

Tuesday, Feb 17, 2015

ARTICLE: Amazing strides have been made in trying to close the big data skills gap. Although companies are still fine-tuning their ideas on what type of skill sets will be needed to form the big data teams to incorporate analytics into business processes, sort and analyze structured and unstructured data, and monetize existing data, those with graduate degrees or doctorates in statistics--the bonafide data scientists--will certainly be an important part of the team.

Wednesday, Feb 18, 2015

PODCAST: Author Jane Cleland-Huang provides an audio recording of her Requirements column in IEEE Software's March/April 2015 issue, in which she discusses an approach that injects value-thinking into feature prioritization by using story mapping.

Thursday, Feb 19, 2015

PODCAST: Author Grady Booch provides an audio recording of his On Computing column from IEEE Software's March/April issue, in which he discusses how we must come to grips with a number of practical and ethical conundrums as machines of our own creation become our companions, helpmates, and servants.

Monday, Feb 23, 2015

VIDEO: Whether you're building smart cars, dealing with the smart grid, want to control a smart home, or are manufacturing the latest smart clothing, you deal with the same confronting challenges as everyone in the “smart technologies” movement. Attend Rock Stars of SmartTech on May 12 in Raleigh to get actionable answers and insights. Register at http://www.computer.org/smarttech.

Monday, Feb 23, 2015

ARTICLE: It takes a leap of faith to trust things you can’t see. Especially if those things are supposed to be protecting your business data. Businesses in the healthcare field have to be cautious about data protection because of HIPAA laws and other privacy regulations that govern health information.

Thursday, Feb 26, 2015

Friday, Feb 27, 2015

ARTICLE: If you’re new to the world of web hosting, you may need a crash course in order to fully understand various terms like dedicated hosting, shared hosting, managed hosting, cloud hosting, and so on.

Tuesday, Mar 3, 2015

ARTICLE: Like any other web hosting service, dedicated hosting solutions have some benefits and some downsides. Nevertheless, in some particular cases, some of the pros can also prove to be cons in the end.

Wednesday, Mar 4, 2015

PODCAST: Author David Alan Grier expands on his Errant Hashtag column, in which he talks about how technology has done much to expand the power of thought, but it also gives us innocent tools that can be used to mask dubious motives. From Computer's March 2015 issue.

Friday, Mar 6, 2015

VIDEO: Gordon Bell talks about the race to build the world's fastest supercomputer as he accepts the IEEE Computer Society's 2014 Seymour Cray Award for designing several computer systems that changed the world of high performance computing, the two most important being the PDP-6 and the VAX-11/780.

Monday, Mar 9, 2015

VIDEO: Charles Leiserson talks about the need to get rid of bloat and inefficiency, build scalable systems, and work on making our computer systems better behaved as he accepts the ACM and IEEE Computer Society 2014 Ken Kennedy Award for his influence on parallel computing systems and their adoption into mainstream use through scholarly research and development.

Wednesday, Mar 11, 2015

VIDEO: Satoshi Matsuoka talks about the 2022 outlook for supercomputing as he accepts the IEEE Computer Society 2014 Sidney Fernbach Award. He received the award for his work on advanced infrastructural platforms, large-scale supercomputers, and heterogeneous GPU/CPU supercomputers.

Tuesday, Mar 10, 2015

ARTICLE: InterConnect is a new customer event that integrates and replaces three smaller and product-focused IBM customer events: Pulse (mobile development), Innovate (software development) and Impact (cloud computing). The three-day analyst track portion of the conference, titled A New Way, had three core stories: A New Way to Think, A New Way to Work and A New Way Forward. LeBlanc has emerged as the single cloud leader IBM needs, appearing at the event with other solution-area senior vice presidents including Mike Rhodin, who leads IBM’s market-making Watson cognitive computing group, and Bob Picciano, who leads IBM Analytics.

Wednesday, Mar 11, 2015

Thursday, Mar 12, 2015

ARTICLE: When 3D printing is helping save lives on ABC’s hit hospital drama, “Grey’s Anatomy,” you know that the technology is hitting the mainstream. For a recent episode, 3D Systems' Medical Modeling unit designed and 3D-printed an anatomically correct model of a tumor afflicting a heart and liver from a production designer's sketch on the back of a napkin. And they did it in only four days.

Thursday, Jan 29, 2015

BLOG POST: This marked my 10th consecutive year at International CES, and as regular as the day’s sunset, there will always be on display various gadgets that make you scratch your head and wonder what the inventors were thinking. And with others, you still scratch your head as well and think – what a clever idea! Why didn’t I think of that?

Monday, Mar 16, 2015

ARTICLE: SXSWedu will screen "Big Dream," an inspiring film that tells the intimate stories of seven young women who are breaking barriers as they follow their passion in science, technology, engineering, and math—the acronymically named STEM fields

Wednesday, Mar 18, 2015

INTERVIEW: Roberto V. Zicari,editor of ODBMS.org, spoke with Bill Franks, Chief Analytics Officer for Teradata, about data warehouses, Hadoop, the Internet of Things, and Teradata`s perspective on the world of big data.

Thursday, Mar 19, 2015

ARTICLE: Roberto V. Zicari, editor of ODBMS.org, spoke with Bill Franks, Chief Analytics Officer for Teradata, about data warehouses, Hadoop, the Internet of Things, and Teradata`s perspective on the world of big data. Roberto is Full Professor of Database and Information Systems at Frankfurt University. He was for over 15 years the representative of the OMG in Europe.

Friday, Mar 20, 2015

ARTICLE: Many computing professionals, at some point in their careers, consider establishing a consulting business. Consulting offers an opportunity to leave the traditional workplace, work independently, and become your own boss.

Monday, Mar 23, 2015

ARTICLE: Healthcare, one of the largest and most vital sectors of the US economy, dragged its feet when other industries embraced information technologies and still creates many of its records by hand. But that may be finally changing. Bolstered by funding from the economic stimulus package, the industry is gearing up to computerize patients’ medical records and create a nationwide infrastructure to facilitate the transmission and exchange of records among patients, doctors, hospitals, pharmacies, and others.

Tuesday, Mar 24, 2015

Wednesday, Mar 25, 2015

ARTICLE: Confidentiality and security are always top concerns when an organization considers leveraging the cloud to store their information, and certainly legitimate ones. In this wek's Analyst Perspectives, analysts talk about managing risks and other issues related to cloud computing.

Friday, Mar 27, 2015

Thursday, Mar 26, 2015

VIDEO: Pervasive computing thrives at the intersection of many areas of computer science, including distributed systems, human-computer interaction, and artifical intelligence, says Maria R. Ebling, IEEE Pervasive Computing Editor in Chief. Ebling, a research staff member at the IBM T.J. Watson Research Center, spoke about P=Pervasive as part of IBM's A-Z Video Series.

Sunday, Mar 29, 2015

ARTICLE: DevOps--a merging of "development" and "operations"--is rapidly changing how software is produced and released. By as early as next year, market-research firm Gartner expects DevOps to move from a niche strategy to the mainstream, embraced by fully a quarter of Global 2000 companies.

Tuesday, Mar 31, 2015

BLOG POST: Unless you’re completely cut off from civilization (in which case you wouldn’t be reading this), drones are rapidly buzzzzzzzing their way into our lives. And the global market and impact is enormous. The Consumer Electronics Association, for instance, estimates about 425,000 drones will be sold this year, amounting to about $130 million in sales. By 2018, the annual market is expected to top $1 billion.

Friday, Aug 31, 2012

BLOGPOST: Companies in IT and software business will fail if they don’t master global software engineering. Prestigious journal Harvard Business Manager recently wrote that outsourcing with global IT services and software development ranks as one of the top business ideas of the past 100 years.

Friday, Sep 28, 2012

BLOGPOST: Cloud computing is one of the hottest topics in technology today, and for good reason. Will the cloud completely transform IT and other industries? Is the cloud something truly new, or just a rehash of old technologies? Can we possibly create a cloud environment...

Wednesday, Oct 3, 2012

BLOGPOST: Cloud computing shares characteristics with many technologies or technological buzzwords that have been around for a while. It relies directly on virtualization, which has been used by companies to improve datacenter efficiency for a long time; it has the concept of computing resources being delivered on-demand, to be paid for on a usage basis, similar to the idea of utility computing; most, if not all, cloud-based software is sold on a pay-as-you go based, using a ...

Friday, Oct 12, 2012

BLOGPOST: Estimating size or resources is one of the most important topics in software engineering and IT. You will not deliver according to expectations, if you don’t plan. And, you cannot plan if you don’t know the underlying dependencies and estimates.

Tuesday, Oct 23, 2012

BLOGPOST: Star West 2012, located at the Disneyland Hotel, just wrapped up, and after five days full of information on the cutting edge of software quality engineering, it’s pretty evident that this conference is here to stay. 2012’s content-offerings were varied and interesting, but I’m here to talk about the expo floor.

Wednesday, Oct 24, 2012

BLOGPOST: The inaugural MobileCon event just wrapped up in San Diego, bringing 5,000 IT professionals from various fields down to an unusually rainy southern California. Designed specifically for the IT executive and professional, most of the content at the conference was about different enterprise solutions centered around the increasingly complex mobile marketplace.

Thursday, Oct 25, 2012

BLOGPOST: If you follow any kind of news on cloud computing, or even technology in general, then you’ve probably heard about the recent outage that Amazon’s cloud services suffered on Monday, October 22. Why do we still see major sites and services being taken down by such outages?

Tuesday, Oct 2, 2012

BLOGPOST: Traditional version control systems derive their requirements from software configuration management practices. The focus of these practices is to identify, control, and disseminate the software’s configuration and changes. A system, like CVS or Subversion, that can retrieve the files corresponding to a specific software version, list the changes that led to it, and keep developers from trampling on each others’ feet satisfies these requirements and can be a boon over exchanging files through a shared folder or email. However, configuration management mainly prevents bad things from happening during software development; it provides (valuable) control, but few tools that genuinely aid a developer’s everyday life.

Tuesday, Sep 25, 2012

BLOGPOST: An IT system’s setup and configuration is a serious affair. It increasingly affects us developers mainly due to the proliferation and complexity of internet-facing systems. Fortunately, we can control and conquer this complexity by adopting IT-system configuration management tools.

Tuesday, Sep 25, 2012

BLOGPOST: How can you determine how much memory is consumed by a specific operation of a Unix program? Valgrind's Massif subsystem could help you in this regard, but it can be difficult to isolate a specific operation from Massif's output. Here is another, simpler way.

Thursday, Nov 29, 2012

BLOGPOST: After a snow-filled week in Salt Lake City for SC ’12, the IEEE Computer Society and ACM co-sponsored conference on supercomputing and high-powered computing, I tried to relax in my airplane seat. When striking up the usual small-talk that accompanies flying coach, I found out that the gentleman sitting in the aisle seat was leaving the conference as well. The man in the middle? Not a techie, and he posed an interesting question to us both: “What exactly is supercomputing?” I won’t bore you with the answer that we gave, but I will say that the question is an important one. Most of the conferences that I find myself at are focused on some narrow aspect of computing, be it mobility, graphics, or software engineering, but I was very excited to be going to my first Supercomputing conference. I like the idea of having a place where HPC, networking, data storage, and education all mix together. Most of my excitement came from curiosity about what kinds of stuff I’d find in the exhibit hall. Would there be flashy booths? Huge HPC racks? Cutting edge applications? Yes.

Monday, Dec 10, 2012

BLOGPOST: More than 500 years ago (or April of 2010, whichever seems more likely), I started this blog with the big, bold, brilliant idea of keeping it limited to 300 words or less about (and I quote): "The Glamorous and Exciting World of Publishing." Yeah, I talk like that.

Thursday, Dec 13, 2012

BLOGPOST: Positive partnerships between academia and industry are the wave of the future for HPC. At the recent Supercomputing conference, these partnerships were some of the more fascinating and encouraging aspects of this growing area of computing.

Friday, Nov 23, 2012

BLOGPOST: Debt is bad. We hear this simple rule from parents when they educate their children on the proper use of money, from politicians when they try to control economy, and of course from our managers when we try to sell a proposal which needs investment. Expenses should be done from our earned money. On the other hand, success often stems from borrowed money. Apple was started in 1976 with borrowed money from an Intel executive. Later Steve Jobs borrowed millions from Bill Gates to turn around the loss-making Apple. There seems to be good and bad debt.

Wednesday, Jan 2, 2013

BLOGPOST: People tell me “there’s just something about the feel of a book in my hands” when explaining why they don’t want to embrace digital delivery methods. I mean, honestly, of course there’s “something” about holding a book: it’s what we’ve done as human beings for two thousand years. It’s ingrained in our minds as The Way Things Are Done. If it hadn’t been for the Chinese and Gutenberg, we’d be hauling around big slabs of stone and drawing pictures of what we had for lunch. But here’s a wild and crazy idea: What if, in a digital age in which content is suddenly, miraculously, for the first time ever, liberated from the physical constraints of the page (or scroll or folio or whatever), what if in such an amazing time we actually treated content as relevant to its medium? That’s a fancy-pants way of saying this: Maybe content that’s delivered on computer screens, or tablet surfaces, or smartphones, should not necessarily be expected to look and act as if it’s being delivered on a piece of paper.

Monday, Jan 7, 2013

BLOGPOST: LISA ’12, Usenix’s 26th Large Installation System Administration conference, brought more than a thousand tech professionals down to sunny (well, partly cloudy) San Diego, and by all accounts, the conference was a success. It’s always intellectually invigorating to see so many smart people together in the same place, discussing the impacts of cloud computing, mobile security, IPv6m, system administration, and HPC.

Friday, Jan 18, 2013

BLOGPOST: In a recent column in the Los Angeles Times, Pulitzer Prize-winning journalist Michael Hiltzik expressed dismay and horror that, while a book-purchaser “owns” the book purchased, and can do as he or she pleases with it— read it, lend it, give it away, sell it, store it on a shelf for a few decades, feed it to the cat—those poor creatures who download books onto e-readers and mobile devices are only receiving a license, with limited ownership rights, and can never fully enjoy the right of owning the book. Their cats, in short, go hungry. He’s not wrong, of course. It is true that the purchase of a book from, say, Amazon’s Kindle Store is in fact not a purchase but a license agreement. Readers are not buying a book: they’re buying the right to access the book’s content stored in Amazon’s cloud.

Monday, Jan 21, 2013

BLOGPOST: Requirements and architecture of any system thus are highly interdependent. Projects without early architecture evaluation will overlook critical requirements. They will fail in prioritizing requirements. They face budget overruns and rework due to inappropriate and late design changes. This blog looks how to bridge the twin peaks of requirements and architecture.

Monday, Feb 4, 2013

BLOGPOST: After having a chance to reflect on this year's CES, it's nice to sit back and parse some of the more potentially far-reaching technologies that maybe didn't get the right amount of press coverage. From cutting-edge tech in TVs and connected homes to gizmos and gadgets, the future looks bright and full of algorithms and automated assistants (and assistance).

Tuesday, Feb 5, 2013

Wednesday, Feb 13, 2013

BLOGPOST: It started with public offerings last year of companies like Facebook and LinkedIn--which at their core are Big Data companies--and Splunk, a Big Data company targeting businesses. This combination of the potential impact of Big Data on my own life plus the sense that these IPOs foretold a sea change in the technology landscape intrigued me. Just as I was finishing the Ironman, I embarked on another journey, to understand the full landscape of Big Data. Much of the knowledge I have gained in the process I plan to share in this column and in my upcoming book, Big Data Demystified: How Big Data Is Changing The Way We Live, Love and Learn.

Friday, Feb 15, 2013

BLOGPOST: Call me Ray. Some years ago - never mind how long precisely - having little or no IT knowledge, and nothing particular to interest me, I thought I would take up a programming language. It is a way I have of...

Tuesday, Feb 19, 2013

Thursday, Feb 21, 2013

BLOGPOST: It’s rare to get Big Data experts from companies like Facebook, Netflix and HortonWorks all together for a discussion. But last Wednesday evening at the Microsoft Campus in Mountain View, California, we were able to do just that. My guests on the Big Date Date Night panel (so named because it took place the evening before Valentine’s Day) were HortonWorks Director of Data Sciences Ofer Mendelevitch, Netflix Director of Analytics Chris Pouliot, SurveyMonkey Director of Analytics Fedor Dzegilenko, Wix Business Analyst Isaac Buahnick and Facebook Head of Analytics Ken Rudin. Here are the takeaways:

Monday, Feb 25, 2013

Tuesday, Mar 5, 2013

Wednesday, Mar 6, 2013

BLOGPOST: In its final report on open access, published in June of 2012, the U.K.’s Report of the Working Group on Expanding Access to Published Research Findings, led by Dame Janet Finch, CBE (“the Finch Report”) made this observation: “The principle that the results of research that has been publicly funded should be freely accessible in the public domain is a compelling one, and fundamentally unanswerable.” Most researchers and scholars who can both understand and use the results that flow from publicly-funded research have, as my steering committee professor said, free and easy access to it. If the people working in the institutions who need the data have access to it through existing channels, where exactly is the necessity to implement vast-reaching changes in the scholarly publishing model?

Thursday, Mar 7, 2013

BLOGPOST: Chief Security Officers, by their nature, have a tall order in today’s world. From managing teams to managing information, their world may seem like a mix of war room and board room to those of us on the outside. At this year’s RSA, Gary McGraw, Cigital’s CTO, moderated a discussion on how CSOs manage security risk. The panel, featuring Eric Grosse (Vice President, Security Engineering at Google), Gary Warzala (CISO, Visa), Jason Witty (CISO, US Bank), and Howard Schmidt (former Presidential Cyber-coordinator), entertained as much as it enlightened the packed room.

Friday, Mar 8, 2013

BLOGPOST: We increasingly rely on complex electronic functions to ensure functional safety. These functions are realized by systems of sensors, actuators and interconnected electronic control units. To mitigate product liability risks associated with such systems as well as to ensure the high level of quality under varying operational conditions, significant improvements to engineering processes are necessary. This blog shows how to master functional safety.

Monday, Mar 11, 2013

Friday, Mar 22, 2013

BLOGPOST: We’ve been so quick to develop technology and devices that do cool things that we sometimes forget to make sure that those shiny new toys are, in fact, secure and safe. In using this year’s RSA as a snapshot of the trends in cyber-security, a lot of the focus falls into mobile end-point security, the secure cloud-as-anchor, and creating an insurmountable defense.

Friday, Mar 22, 2013

BLOGPOST: H-WOOD TOP TRADE’S BAD BOFFOLA FORCES FLIP: VARIETY VENTURES VIRTUAL, PASSES ON PULP For those unfamiliar with the unique phraseology of Daily Variety, the entertainment industry’s newspaper, it’s how the century-old paper might describe its situation today: Hollywood’s Top Trade Publication’s Poor Financial Performance Forces a Change: Variety to go Online-only, Ends Daily Paper Publication. Anyway, it’s true: Daily Variety newspaper, which has published industry gossip, insider information, and entertainment news since 1905, is no more. There’s a website, supplemented by a weekly (print) magazine that’s probably not long for this world, either. We knew everything in publishing was going to change; it’s just changing right now, and very, very fast.

Monday, Jul 1, 2013

BLOGPOST: You cannot control what you cannot measure. This holds especially for software productivity, where many companies struggle how to measure and improve it. Often we in software and IT fail to understand that productivity relates to delivering value – as opposed to collecting features and increasing complexity. This blog will provide some guidance and hints for measuring productivity. Let me know of any further question or stimulus arising from this blog.

Tuesday, Jul 16, 2013

BLOGPOST: Now that the dust has settled on another Electronic Entertainment Expo, it’s interesting to take a look back and see some of the announcements and innovations unveiled at the annual show. For me, it wasn’t about the games with the bloated budgets; it was about the things hiding in the corners, waiting to speak about the future of serious games, peripherals, and the industry growing up.

Friday, Aug 2, 2013

Sunday, Aug 4, 2013

BLOGPOST: Cloud computing technologies in Middle East and North Africa (MENA) have become what will be used in the near future for companies and organizations, especially in providing integrated services for each company separately according to client's desires and requirements.

Monday, Aug 19, 2013

Monday, Aug 26, 2013

BLOGPOST: In addition to all its other benefits, cloud computing brings an incredible chance for innovation for companies of all sizes. The revolutions enabled by cloud computing are only at their beginning.

Friday, Oct 11, 2013

Saturday, Oct 12, 2013

Tuesday, Oct 15, 2013

BLOGPOST: Rising cost pressure is forcing manufacturers and their suppliers to jointly and consistently master product development. Product and application life-cycle management (PLM and ALM) is the primary mechanism for integrating engineering processes, tools and people across the domains of system, software, hardware and mechanical engineering. This blog will provide some guidance and hints for successfully introducing PLM and ALM. Let me know of any further question or stimulus arising from this blog.

Wednesday, Dec 4, 2013

PODCAST: The decreasing cost of Cloud-based storage has made long term storage, or archiving files, financially affordable. In January 2013, Aberdeen surveyed 123 organizations to learn how they use the Public Cloud as part of their IT infrastructure, including a variation of Cloud storage – Cloud archiving. This report focuses on the technology enablers (related computing tools) that lead to successful Cloud archiving programs.

Tuesday, Dec 10, 2013

PODCAST: Today Unify (the next-generation communications company formerly known as Siemens Enterprise Communications) made the surprise announcement that their CEO Hamid Akhavan is being replaced by Dean Douglas, currently President and CEO of enterprise technology distributor Westcon Group Inc.

Sunday, Dec 8, 2013

Friday, Dec 13, 2013

BLOGPOST: It’s becoming the latest trend in enterprise software company evolution. After years of merger and acquisition, in which dozens of products and thousands of customers were dumped helter-skelter into a single corporate bucket, yet another agglomeration of disparate products, services, and technologies is trying to rationalize its offerings. This time the company is OpenText, and the rationalized product set is code-named Red Oxygen, a collection of five suites of functionality that span search, analytics, archiving, publishing and presentment, social collaboration, process management, integration, content management, and a development and deployment platform.

Wednesday, Jan 8, 2014

PODCAST: “Victory has many fathers. Defeat is an orphan”. President John Fitzgerald Kennedy, on the Bay of Pigs Fiasco It’s great line, and one that popular culture has changed to success has many fathers and failure is an orphan. JFK’s line is a stirring example of a leader taking ultimate responsibility for what happened under his watch. But the truth, which any student of the art of failure knows well, is that it takes as many people to kill an undertaking as it does to make it succeed.

Wednesday, Jan 15, 2014

PODCAST: I’ve realized recently that despite everything we analysts do and say about enterprise software company strategies, new products and technologies, trends, and all the other coins of the analyst realm, what matters most is how the sales force sells. If the field sales force can’t get in front of the right influencer at the right time with the right mix of product and strategy, then every analysis, recommendation, critique and consulting gig geared towards fine tuning go-to-market strategies quickly goes to hell in a hand basket. The bottom line is no go-to-market strategy is so perfect that it can’t die an ignominious death in the field.

Friday, Jan 17, 2014

BLOGPOST: Where we last left off, I was admonishing the SAP field to greater glory around the theme of customer success. Here’s the rest of my letter to the SAP field: Sell Value, Not Platforms: Now I’m going to probably get yelled again by some of your execs, but trust me, there are going to be very few customers who see you walking in the door trying to sell a massive platform reboot and sob with relief at the prospect.

Tuesday, Feb 4, 2014

PODCAST: In the small town of Greenland, New Hampshire (population 3,653, based on the 2012 US Census estimates), on the day after Christmas 2013, a town employee opened an email indicating that they had received a voice message from AT&T … and infected the computers at the Town Hall with malicious software known as CryptoLocker.

Monday, Feb 10, 2014

BLOGPOST: The ascendency of Satya Nadella to the top spot at Microsoft is welcome news to a wide range of internal and external stakeholders. He’s an insider who knows not just where the skeletons are buried, but, more importantly, where the gemstones are buried too.

Thursday, Feb 13, 2014

BLOGPOST: Microsoft made the announcement that CEO Steve Ballmer was stepping down and would be replaced by longtime Microsoft executive Satya Nadella. My first reaction to the news was how small a blip it made in public awareness. Talk to any number of people on the street and probably very few even know that this change happened. Even on technology news sites the announcement received, at best, equal billing with other tech news of the day and, in some cases, was overshadowed by coverage of Facebook’s tenth anniversary.

Tuesday, Feb 18, 2014

BLOGPOST: Aberdeen asked adopters of real-time analytics a simple question: who is the primary driver behind your analytical initiatives? The majority respondents fell into one of two groups: those with analytics driven by executives and those driven by line of business (LoB) decision makers. The questions then became: how does the source of motivation for adopting real-time analytics affect the day-to-day realities and impact of data-driven decisions.

Tuesday, Feb 18, 2014

BLOGPOST: Welcome to NealNotes; this is my inaugural blog post. Not exactly Proustian prose, but there you have it – short/succinct. Going forward, I’ll comment on various technology trends/issues/ideas, in short, whatever techles my fancy (sorry, inveterate punster too, even when borderline like that one). Unless you have successfully disengaged yourself from every conceivable 21st Century communications device, you’ve probably been hearing a lot about wearable devices – that they’re the next big trend/revolution/most stupendous technological invention since the cotton gin, ad nauseum. Well, not quite, but wearable devices were yakked about incessantly at CES 2014 last month and the overall buzz is getting louder.

Thursday, Feb 20, 2014

BLOGPOST: There are many nerdy little corners of enterprise software that don’t get the big buzz effect of overly hyped concepts like “social” and “mobile”, but never let inattention lure you into complacency. There are many factors that lead to project success or failure, and some of the more nerdy are in fact much more relevant to overall enterprise success than giving away iPads to your salespeople or trying to foist some collaboration software on an un-collaborative workforce.

Monday, Mar 10, 2014

BLOGPOST: Following Oracle’s acquisition of the Eloqua marketing automation platform (MAP) and Responsys campaign management , BlueKai represents a compelling addition to Oracle’s Customer Experience Cloud. While the devil is often in both the technical and organizational synthesis details of acquisitions, something Oracle has plenty of experience with, the BlueKai-Eloqua/Responsys combination opens up the possibility to support truly integrated digital marketing and customer experience management.

Tuesday, Mar 11, 2014

BLOGPOST: In RSA Conference 2014: The Bully, the Nerdy Kid, and the Rumble That Didn’t Happen (6 March 2014), I noted that among the dozen high-profile keynotes, just four of them even mentioned the escalating tension between the role of surveillance in our government’s mission to defend us, and in its mission to protect our privacy and civil liberties – and one of those was from the government itself.

Tuesday, Mar 11, 2014

BLOGPOST: It’s almost ironic that using a Windows 8 phone is actually a major geek credential – albeit geek more in the mold of driving a DeLorean than tooling around in a state of the art Tesla. But as a Windows 8 phone user for the past five months, I can say that no one notices these days when you have a new iPhone, but running around with a Windows 8 phone certainly draws comment, a good deal of it polite, if not positive. Perceptions aside, my Nokia 928 and its software are a pretty damn good tool for work, and as a business tool it’s pretty much on par with my old iPhone – albeit not a perfect one. And, if you put the larger form factor of the Nokia product line into the equation, the extra real-estate makes a huge difference in my day to day work and consumer life.

Tuesday, Mar 11, 2014

BLOGPOST: Ever corrected a problem and introduced two new defects? Introduced a last-minute change and accidentally removed an important feature? Growing governance concerns demand traceability between needs and solutions to preserve work product integrity. Traceability facilitates maintainability and dramatically reduces cost of rework. However without the right methodology and technology, traceability can be highly inefficient and thus rather decrease value.

Friday, Mar 21, 2014

BLOGPOST: I’ve been working my way through Nate Silver’s The Signal and the Noise and early in the book he shares an interesting finding about the predictions of political pundits. Basically, there is a negative correlation between how often a pundit appears on TV and the accuracy of their predictions. The louder and more visible the talking head, the worse their predictions tend to be. I share this because in business media, prognostications continue to get bolder, louder, and more frequent. Erudite experts present vast databases and newfangled models that fuel their analytical crystal balls. However, the media’s love affair with data-driven predictions has not proven infectious in the Business Intelligence (BI) community. Past Aberdeen Group research has extolled the value and benefits of predictive analytics in a number of functions and industries. However, new data from Aberdeen’s 2014 Business Analytics survey shows that adoption of predictive analytics has not taken off as one may have, well, predicted.

Wednesday, Mar 26, 2014

BLOGPOST: Unless you’re completely off the technology grid (and in which case, you wouldn’t be reading this post anyhow), you’ve probably been bombarded by countless stories/mentions about the Internet of Things (IoT). Whether you’re aware of it – like it or not – the IoT is already transforming our lives. Procter & Gamble, for instance, rolled out a web-enabled toothbrush at last month’s Mobile World Congress in Barcelona. It links with your smartphone, records your brushing habits and even has an app providing mouth-care tips alongside news headlines.

Thursday, Apr 10, 2014

PODCAST: The official theme for the Interop 2014 in Las Vegas this week is “Celebrating the IT Community” but we all know the “real” theme of the show will quickly become apparent based on what everyone is talking about. Two years ago it was all about BYOD. Last year was the SDN coming out party. So what’s the overriding theme this year? Well, there’s still a lot of talk about SDN. And BYOD is still getting lots of attention. Walk around and you’ll hear a lot about big data analytics and Internet of Things. Plus discussion about lots of other technologies and trends. Come to think of it, maybe “Celebrating the IT Community” isn’t that bad.

Friday, Apr 18, 2014

BLOGPOST: It’s challenging enough trying to generate some noise and buzz about your product/service/app if you’re a U.S.-based startup. Cracking the U.S. market can be daunting. But if you’re a foreign startup, the difficulties are manifold. Fortunately, many countries and private organizations have realized this and have rolled out extensive programs and services to bolster the success rate for these nascent companies on this side of the pond.

Tuesday, Apr 22, 2014

PODCAST: Earlier this week I attended Infor’s Innovation Summit at their offices in New York City. It was an opportunity to both check out the amazing renovations that the company has made to their offices as well as catch up on some of the changes they have made to their large portfolio of enterprise software products. Infor is unique in that they have an internal creative agency, Hook & Loop, that is tasked with changing the overall experience of the software and making it more easy to use, modern, and functional. The influence of Hook & Loop extends through the software, to the marketing, and into the design of Infor’s office itself.

Monday, May 5, 2014

BLOGPOST: “Ladies and gentlemen, welcome to Hawaiian Airlines Flight 45. Our 2,300 mile flight from San Jose to Maui will take about five and a half hours, and we’ll reach a maximum cruising altitude of about 38,000 feet.” I wonder if the 15-year old boy who was stowed away in the wheel well for the landing gear of the Boeing 767 heard this announcement. Somewhat miraculously, he survived the flight. This case should be the poster child for the difference between video surveillance (human monitoring, analysis and response to video data as it is being captured and displayed), and video analytics (automated monitoring and analysis of video data, to identify and track objects, to analyze motion, and most importantly to generate alerts on exceptions or abnormal events for humans to investigate).

Wednesday, Apr 30, 2014

Sunday, May 18, 2014

Wednesday, May 21, 2014

BLOGPOST: It’s hard to find a set of topics more relevant to the interplay of technology and society than security and privacy. From Glenn Greenwald’s new book on NSA leaker Edward Snowden to the recent finding of a European Union court that Google has to drastically alter the persistence of user data in its services, the societal fallout from the Internet as it enters its Big Data phase is everywhere.

Tuesday, May 27, 2014

BLOGPOST: Yet another compromise of millions of consumer records has been disclosed, in this case by eBay. A summary of the facts provided so far by the company, along with some parenthetical comments and observations from me: A “small number of employee login credentials” were compromised, allowing unauthorized access to eBay’s corporate network.

Thursday, May 29, 2014

BLOGPOST: Can the Internet of Highly Insecure Things Be Trusted to Run the One True Network? As the dust settles on the recent changes at SAP, and with SAPPHIRE looming large, it’s worth taking a look at what I think will be one of the most interesting, ambitious, and potentially lucrative bets SAP has made in a long time. The bet is on Ariba and its vision for a global, competitor-crushing, B2B network. At stake is nothing short of a major reconfiguration of the global economy, global trade, global service delivery, and pretty everything else that falls under the rubric of B2B commerce as we know it.

Friday, May 30, 2014

BLOGPOST: Back in 1974, Dov Frohman, one of Intel’s first employees and the inventor of EPROM, erasable programmable read only memory, decided to leave Silicon Valley and return to Israel, his adopted home since 1949. Frohman was charged with helping Intel establish a small chip design center in Haifa, which at the time, was Intel’s first outside the U.S. The rest, as the cliché goes, is history. In a little over a generation, the Israeli semiconductor industry has grown to now employ more than 20,000; annual revenues are about US $5 billion.

Saturday, May 31, 2014

Thursday, Jun 12, 2014

Friday, Jun 13, 2014

BLOGPOST: Over the years, Apple’s Worldwide Developers Conference (WWDC) has seen its share of major announcements and new products, from the rise of OS X to the first Intel-based Macs to many of the key iPhone evolutions. At first glance, the 2014 WWDC, held this week in San Francisco, doesn’t look like it will be as impactful as some of its predecessors. However, some of the announcements this week, especially for developers, could signal some big changes for Apple down the road.

Thursday, Jun 19, 2014

BLOGPOST: Earlier this week, in the opening address of PTCLive 2014, CEO Jim Heppelmann challenged us to think about The Internet of Things (IoT) – a vision for an interconnected world where products are enhanced and transformed by the seamless interconnectivity of devices and sensor-enabled objects. While I am not as dismissive of IoT as my colleague Kevin Prouty, I agree that the concept is certainly not new. Like Kevin, I first heard about IoT in the 90’s (although, we didn’t call it that back then; and come to think about it, I am still waiting for my refrigerator to automatically re-order milk!).

Friday, Jun 20, 2014

PODCAST: I spent the last three days in San Diego (not a tough sell in June, or any other month) for Alteryx Inspire 2014. CEO Dean Stoecker kicked things off on Tuesday, taking the stage flanked by a two-member uniformed marching band and the power guitar riffs of Muse’s “Uprising.” I prepared myself for more theatrics in the style of The Wolf of Wall Street, but Mr. Stoecker smoothly transitioned into introducing the conference’s theme of “analytic freedom.” He made several points that resonated with me and my research, including changing the role of IT “from gatekeepers to air traffic controllers” and putting as many tools as possible in the hands of the “modern data analyst” working at the line of business.

Monday, Jun 23, 2014

BLOGPOST: Yesterday I was one of a few Aberdeen Analysts that attended PTC Live 2014. As Kevin Prouty highlighted yesterday, there was a huge focus on the Internet of Things (IoT). In fact, IoT was injected into almost every presentation and break out session; not surprising given the recent acquisition of ThingWorx, PTC’s new IoT and M2M platform. However, there was another acquisition that was announced in Jim Heppelmann’s keynote address that deserves more fanfare – PTC’s acquisition of the systems engineering company Atego.

Wednesday, Jun 25, 2014

PODCAST: The ‘selfie’ phenomenon has grown exponentially. BGR, for instance, estimates more than 250 billion selfies will be taken worldwide this year. People from all walks of life have embraced selfies. In fact, The Guardian reports that UK farmers are posting ‘felfies’ – a selfie snapped on the farm. “But it’s not just for fun – social media is a lifeline for people in a lonely profession…the ‘felfie’ is taking off, with farmers posting photos of themselves next to their favorite sheep, cow or tractor,” noted The Guardian.

Wednesday, Jul 23, 2014

PODCAST: Culturing 3D human tissue on a microchip isn’t new. Like system-on-a-chip (SoC), which shoehorns most of a digital computer into a single chip, an organ-on-a-chip is designed to replicate human organ functions (including activities and mechanics like blood and oxygen flow) on a transparent, flexible microchip. These microfluidic devices which, in effect, are 3D cell culture versions of real organs, already exist for artery, cartilage, gut, heart, kidney, and skin.

Friday, Aug 15, 2014

PODCAST: Quick – how many times in the last couple of months have you been advised to change your password, because of a high-profile security breach or vulnerability? Let’s see now … there was the highly sensationalized Heartbleed bug, which probably affected several sites that you use regularly. Then there was the breach at eBay, which compromised a database containing the passwords and personal information of 145 million subscribers.

Friday, Aug 22, 2014

BLOGPOST: As we celebrate the 25th anniversary of the creation of the World Wide Web, let’s take a little bit of time to look back at the history of this transformative technology and also look forward to what the next few years hold in store for the web.

Monday, Sep 1, 2014

BLOGPOST: Last year architects in Amsterdam started constructing a 3D printed home. Aircraft manufacturers are honing ways to build 3D printed planes. And 3D printing is now wending its way through the fashion industry. A 3D printed dress designed by Michael Schmidt (designed on an iPad), was printed for a private runway event – it was printed in 17 parts on an EOS P350 3D printer. “3D printing presents tremendous opportunities for businesses,” said Simon Jones, a partner at DLA Piper in London, a global law firm. “Manufacturers will no longer need to own large production facilities halfway around the world, because they can print products on demand or sell licenses to print them locally. This will have a huge impact on the supply chain; it will benefit the environment as there will be less waste, and companies will no longer need to spend a fortune gearing up to make a product and hoping its stock sells.” So the sky’s the limit for 3D printing. And for counterfeiters too.

Monday, Sep 8, 2014

Monday, Sep 15, 2014

BLOGPOST: I’m heading to the SuccessFactors user conference, SuccessConnect, in Las Vegas this week and, as a prelude to the conference, here’s some of the questions I’m looking to have answered during the course of the conference.

Thursday, Sep 18, 2014

PODCAST: SuccessFactors’ user conference, SuccessConnect, has come and gone, and the four questions I posed in my previous post about the challenges facing SuccessFactors and SAP were largely answered. But, as in any good dialectic, one good answer is just the starting point for another good question….. I’ll start with the Workday question/answer in this post, and continue with answers to my other three questions in a subsequent post.

Tuesday, Sep 23, 2014

BLOGPOST: The fundamental problems plaguing Oracle won’t go away with Larry moving into an executive chairman role, this is more lipstick on a pig than a serious attempt to get the company back on course. The problem is that shuffling the deck chairs does nothing for dealing with the company’s three fundamental problems. Until these are addressed, I think it’s safe to assume there will be no turnaround any time soon.

Friday, Oct 3, 2014

BLOGPOST: With the world’s population now exceeding seven billion, many municipalities in both emerging markets and developed nations are paying closer attention on how they manage their infrastructure and resources. A number of larger cities are well on their way to becoming smart cities. Market research firm Frost & Sullivan succinctly sums up how these cities are now being defined – built on solutions and technology leading to the adoption of at least five of eight smart parameters – smart energy, smart building, smart mobility, smart healthcare, smart infrastructure, smart technology, smart governance and smart education, and smart citizen.

Friday, Oct 10, 2014

BLOGPOST: The news that Meg Whitman is finally pulling the plug on the Sisyphian task of trying to resurrect HP has profound implications for the future of Oracle, and not just because the mess that Whitman was unable to unravel was an HP made functionally unmanageable by a previous HP CEO: Mark Hurd, now co-CEO of Oracle. I think Oracle has been on the leadership skids for a while, but Hurd’s track record at HP, the end-game of which is now being played out in the breakup of the once-vaunted tech leader, provides a good roadmap for how Oracle ends up on the chopping block like HP.

Friday, Oct 24, 2014

BLOGPOST: It’s hard to slog through mega-conferences like Dreamforce, and not just because 135,000 people are way too much for San Francisco and its Moscone Center to handle. The sheer girth of Salesforce.com is also a factor: the company has become an immensely complicated and multifaceted company, maybe too much so for a single conference. Regardless, Dreamforce reminds me of why I don’t see my favorite bands in a coliseum setting: The volume needed to fill a coliseum washes out the undertones and overtones that make music a rich and complex listening experience, instead leaving the listener to sort through a lot of random, washed out noise.

Thursday, Oct 30, 2014

BLOGPOST: There’s always a lot to say about Microsoft, and, like any big company, it’s usually a mix of good or bad. Having spent two days last week at the Microsoft Dynamics analyst event, I think that when it comes to the enterprise, most of what there is to say about Microsoft isn’t just good: Microsoft’s enterprise story just gets better and better, and while there are holes and issues abounding, the old maxim that Microsoft eventually gets it right was very much in evidence last week (with one notable, and important exception).

Thursday, Oct 30, 2014

BLOGPOST: Textbook. 20th Century definition: A manual of instruction in any branch of study. 21st Century definition: Ancient learning methodology, last used by aging baby boomers. Killed lots of trees. Replaced by e-Books that are usually interactive and often open or free to use and sometimes edit.

Tuesday, Nov 18, 2014

BLOGPOST: Hanging out with Kinaxis, the relatively small and always interesting supply chain vendor from Ottawa, Canada, never fails to be an eye-opening experience. It’s not just that I get to meet with a vendor and a loyal cadre of customers who are collectively pushing the envelope on all things supply chain, it’s that sometimes they’re pushing an envelope I hadn’t seen before in my peregrinations in the supply chain world. This year’s Kinexions user conference was no different. What I heard from Kinaxis about taking Rapid Response, its in-memory supply chain planning product, further into the realm of collaboration by pushing users to self-identify their areas of responsibility represented an excellent strategic direction on the part of Kinaxis

Monday, Dec 1, 2014

BLOGPOST: It’s probably not too far fetched now to predict that in the near future – at least within the next decade or so according to some studies and experts – you might be served by R2D2, or a similar robotic food service entity. Yes, numerous restaurants, especially those of the fast-food variety, are rapidly embracing

Tuesday, Dec 2, 2014

PODCAST: There is perhaps no contemporary issue at the intersection of technology and public policy that is more contentious and conflicted than net neutrality. The issue itself has probably accounted for its own increase in Internet traffic over the last couple of years as opinions, jeremiads, official proclamations, and even HBO’s John Oliver, have weighed in on the issue.

Wednesday, Dec 10, 2014

BLOGPOST: I think it’s pretty fair to say that counting Microsoft out in a market it has made a commitment to is a classic rookie mistake that serves as the epitaph for too many forgotten companies. If at first you don’t succeed, try try again is a time-honored mantra in Redmond. And it’s pretty evident that Windows Phone is one of those areas where Microsoft has made big commitments – including but hardly limited to its $7.2 billion purchase of Nokia’s phone business – and where the company is on the record as committed to try try again.

Monday, Dec 22, 2014

PODCAST: In mid-2012, in a blog titled Are We Human?, I described some of the benefits of using technologies such as CAPTCHA, reCAPTCHA, nuCAPTCHA and Are You A Human to help enterprises figure out whether their online application is dealing with an actual human user, or with another computer program. For example, they can help to: - Block “comment spam” on blogs and other social media sites - Protect the legitimacy of online polls and surveys - Protect self-service password reset pages from automated attacks - Prevent fraud and enforce business policies, such as blocking the automated ordering of large blocks of tickets to highly coveted events - Maximize online revenue, by fast-tracking legitimate human users before they drop off the site in frustration, before completing their transaction

Tuesday, Dec 23, 2014

PODCAST: Today, enterprises are on a journey toward greater business agility and IT efficiency, and the pressure is on the office of the CIO to provide more capacity for less cost. CIOs are tasked with leveraging a commodity IT platform that also needs to be agile and exploited for business value. As such, enterprises are shifting compute and application resources from a dedicated model to a cloud-based, pay-per-use model at rapid rates, with forecasts predicting the cloud services market to attain a 24.8 percent CAGR through 2018.

Tuesday, Feb 3, 2015

Friday, Feb 13, 2015

BLOGPOST: So, smooth sailing for S/4 HANA?– Not likely, certainly nothing like the good old days when R/3 was the biggest and the baddest modern, client/server, enterprise software product on the market, marauding through the global economy like a rum-soaked buccaneer.

Thursday, Feb 19, 2015

BLOGPOST: One of the most compelling benefits of Cloud computing has been its ability for on-demand provision of extraordinarily scalable resources. This has led to a widespread adoption of cloud computing for diverse application domains including both industry and academia. By virtue of its commercial viability, it has become an extremely attractive prospect especially for Small and Medium Enterprises (SMEs).

There are no entries that match your criteria.

IEEE Annals of the History of Computing covers computer history with scholarly articles by leading computer scientists and historians, as well as first-hand accounts.

Cloud Computing magazine is committed to the timely publication of peer-reviewed articles that provide innovative research ideas, applications results, and case studies in all areas of cloud computing.

IEEE Computer Graphics and Applications magazine bridges the theory and practice of computer graphics, from specific algorithms to full system implementations.

Computing in Science & Engineering addresses the need for efficient algorithms, system software, and computer architecture to address large computational problems in the hard sciences.